About your Search

20121206
20121206
Search Results 0 to 1 of about 2 (some duplicates have been removed)
that's been appointed to review what happened in benghazi, libya, on 9/11 of this year, he is on an advisory board at the state department and one at the cia. so clearly, this man has got important matters on his desk. how exposed could we be if the chinese have access to all of his writings? >> very exposed. and this is nothing new. if you take a look at a typical burglar and he wants to break into a yard and has this hardened lock on a fence that he cannot cut through, what is he going to do? he's going to cut the chain. we're not going to go after a facility that spends billions of our tax dollars on securing their networks. we're going to go after somebody who works outside, somebody who has access to internal resources. it's called a u-turn attack. what they do is they find that weak link such as a home computer or a personal computer belonging to a former admiral or cia agent, and they attack that. they get access to that, and then they use their vpn connection inbound to get access to the same resources he would have access to or she would have access to based on the
Search Results 0 to 1 of about 2 (some duplicates have been removed)